메뉴 건너뛰기




Volumn 88, Issue , 2012, Pages 78-86

Host-based intrusion detection systems adapted from agent-based artificial immune systems

Author keywords

Agent; Artificial immune system; Danger theory; Dendritic cell algorithm; Intrusion detection

Indexed keywords

ACTIVATION THRESHOLDS; AGENT BASED; ARTIFICIAL IMMUNE SYSTEM; COMPUTER HOSTS; DANGER THEORIES; DENDRITIC CELL ALGORITHMS; DENDRITIC CELLS; HOST-BASED INTRUSION DETECTION SYSTEM; HUMAN IMMUNE SYSTEMS; IMMUNE RESPONSE; INPUT SIGNAL; INTRUSION DETECTION SYSTEMS; LEARNING AND MEMORY; MALICIOUS BEHAVIOR; MULTIPLE AGENTS; OPERATING CENTERS; OUTPUT SIGNAL; SYSTEM CALLS;

EID: 84860237427     PISSN: 09252312     EISSN: 18728286     Source Type: Journal    
DOI: 10.1016/j.neucom.2011.07.031     Document Type: Article
Times cited : (65)

References (22)
  • 2
    • 77956185060 scopus 로고    scopus 로고
    • Agent-based artificial immune system approach for adaptive damage detection in monitoring networks
    • Chen B. Agent-based artificial immune system approach for adaptive damage detection in monitoring networks. J. Networks Comput. Appl. 2010, 33:633-645.
    • (2010) J. Networks Comput. Appl. , vol.33 , pp. 633-645
    • Chen, B.1
  • 3
    • 75149138866 scopus 로고    scopus 로고
    • Intelligent agent based artificial immune system for computer security-a review
    • Ramakrishnan S., Srinivasan S. Intelligent agent based artificial immune system for computer security-a review. Artif. Intell. Rev. 2009, 32:13-43.
    • (2009) Artif. Intell. Rev. , vol.32 , pp. 13-43
    • Ramakrishnan, S.1    Srinivasan, S.2
  • 4
    • 0029716418 scopus 로고    scopus 로고
    • Longstaff, A sense of self for unix processes, in: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy.
    • S. Forrest, A. Hofmeyr, T. Somayaji, Longstaff, A sense of self for unix processes, in: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120-128.
    • Forrest, S.1    Hofmeyr, A.2    Somayaji, T.3
  • 5
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion detection using autonomous agents
    • Spafford E., Zamboni D. Intrusion detection using autonomous agents. Comput. Networks 2000, 34:547-570.
    • (2000) Comput. Networks , vol.34 , pp. 547-570
    • Spafford, E.1    Zamboni, D.2
  • 6
    • 59349106158 scopus 로고    scopus 로고
    • Distributed agents model for intrusion detection based on AIS
    • Yang J., Liu X., Li T., Liang G., Liu S. Distributed agents model for intrusion detection based on AIS. Knowl.-Based Syst. 2009, 22:115-119.
    • (2009) Knowl.-Based Syst. , vol.22 , pp. 115-119
    • Yang, J.1    Liu, X.2    Li, T.3    Liang, G.4    Liu, S.5
  • 8
    • 0028201732 scopus 로고
    • Tolerance, danger and the extended family
    • Matzinger P. Tolerance, danger and the extended family. Annu. Rev. Immunol. 1994, 12:991-1045.
    • (1994) Annu. Rev. Immunol. , vol.12 , pp. 991-1045
    • Matzinger, P.1
  • 9
    • 77649237173 scopus 로고    scopus 로고
    • A danger theory inspired artificial immune algorithm for on-line supervised two-class classification problem
    • Zhang C., Yi Z. A danger theory inspired artificial immune algorithm for on-line supervised two-class classification problem. Neurocomputing 2010, 73:1244-1255.
    • (2010) Neurocomputing , vol.73 , pp. 1244-1255
    • Zhang, C.1    Yi, Z.2
  • 14
    • 69849112918 scopus 로고    scopus 로고
    • An agent-based classification model
    • in: Ninth European Agent Systems Summer School (EASSS2007).
    • F. Gu, U. Aickelin, J. Greensmith, An agent-based classification model, in: Ninth European Agent Systems Summer School (EASSS2007).
    • Gu, F.1    Aickelin, U.2    Greensmith, J.3
  • 15
    • 45849105605 scopus 로고    scopus 로고
    • An artificial immune system model for multi agents based resource discovery in distributed environments
    • in: Proceedings of the First International Conference on Innovative Computing, Information and Control.
    • K.-W. Yeom, J.-H. Park, An artificial immune system model for multi agents based resource discovery in distributed environments, in: Proceedings of the First International Conference on Innovative Computing, Information and Control, pp. 234-239.
    • Yeom, K.-W.1    Park, J.-H.2
  • 16
    • 66249108974 scopus 로고    scopus 로고
    • Integrating innate and adaptive immunity for worm detection
    • in: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining.
    • J. Zhang, Y. Liang, Integrating innate and adaptive immunity for worm detection, in: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, pp. 693-696.
    • Zhang, J.1    Liang, Y.2
  • 17
    • 52249123251 scopus 로고    scopus 로고
    • Multi-agents artificial immune system (MAAIS) inspired by danger theory for anomaly detection
    • in: International Conference on Computational Intelligence and Security Workshops.
    • H. Fu, X. Yuan, N. Wang, Multi-agents artificial immune system (MAAIS) inspired by danger theory for anomaly detection, in: 2007 International Conference on Computational Intelligence and Security Workshops, pp. 570-573.
    • (2007) , pp. 570-573
    • Fu, H.1    Yuan, X.2    Wang, N.3
  • 19
    • 34548453089 scopus 로고    scopus 로고
    • An agent based and biological inspired real-time intrusion detection and security model for computer network operations
    • Boukerche A., Machado R., Juca K., Sobral J., Motare M. An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Comput. Commun. 2007, 20:2649-2660.
    • (2007) Comput. Commun. , vol.20 , pp. 2649-2660
    • Boukerche, A.1    Machado, R.2    Juca, K.3    Sobral, J.4    Motare, M.5
  • 20
    • 84860231343 scopus 로고    scopus 로고
    • Integrating Artificial Immune Algorithms for Intrusion Detection, Ph.D. Thesis, University College London
    • J. Kim, Integrating Artificial Immune Algorithms for Intrusion Detection, Ph.D. Thesis, University College London, 2002.
    • (2002)
    • Kim, J.1
  • 21
    • 68349160839 scopus 로고    scopus 로고
    • Information fusion for anomaly detection with the dendritic cell algorithm
    • Greensmith J., Aickelin U., Tedesco G. Information fusion for anomaly detection with the dendritic cell algorithm. Inf. Fusion 2010, 11:21-34.
    • (2010) Inf. Fusion , vol.11 , pp. 21-34
    • Greensmith, J.1    Aickelin, U.2    Tedesco, G.3
  • 22
    • 0036613003 scopus 로고    scopus 로고
    • An artificial immune system architecture for computer security applications
    • Harmer P., Williams P., Gunsch G., Lamont G. An artificial immune system architecture for computer security applications. IEEE Trans. Evol. Comput. 2002, 65:252-280.
    • (2002) IEEE Trans. Evol. Comput. , vol.65 , pp. 252-280
    • Harmer, P.1    Williams, P.2    Gunsch, G.3    Lamont, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.